Computer security -- United States
Resource Information
The concept Computer security -- United States represents the subject, aboutness, idea or notion of resources found in Biddle Law Library - University of Pennsylvania Law School.
The Resource
Computer security -- United States
Resource Information
The concept Computer security -- United States represents the subject, aboutness, idea or notion of resources found in Biddle Law Library - University of Pennsylvania Law School.
- Label
- Computer security -- United States
- Authority link
- http://id.loc.gov/authorities/subjects/sh2008101478
102 Items that share the Concept Computer security -- United States
Context
Context of Computer security -- United StatesSubject of
No resources found
No enriched resources found
- 2010 Census : Basic Design Has Potential, but Remaining Challenges Need Prompt Resolution
- 2020 Census : actions needed to address key risks to a successful enumeration
- 7 prácticas para la seguridad de su computadora
- Bolstering the government's cybersecurity : lessons learned from WannaCry : joint hearing before the Subcommittee on Oversight & Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives, one Hundred Fifteenth Congress, first session, June 15, 2017
- Bureau of Public Debt : Areas for Improvement in Information Security Controls
- Bureau of the Public Debt : Areas for Improvement in Information Security Controls
- Business Systems Modernization : IRS Needs To Complete Recent Efforts To Develop Policies and Procedures To Guide Requirements Development and Management
- CDM, government perspectives on security and modernization : joint hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives and the Subcommittee on Information Technology of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fifteenth Congress, second session, March 20, 2018
- Committee markups of H.R. 1224, H.R. 1430, H.R. 1431, H.R. 2105, H.R. 2809, H.R. 2763, H.R. 1159, H.R. 4376, H.R. 4377, H.R. 4378, H.R. 4375, H.R. 4323, H.R. 4254, H.R. 3397, H.R. 4675, H.R. 5345, H.R. 5346, H.R. 5086, H.R. 5509, H.R. 5503, H.R. 5905, H.R. 5907, H.R. 5906, H.R. 6227, H.R. 6229, H.R. 6226, H.R. 6398, S. 141, and H.R. 6468 : compilation of markups before the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Fifteenth Congress, first and second sessions, 2017-2018
- Computer insecurities at DOE headquarters : DOE's failure to get its own cyber house in order : hearing before the Subcommittee on Oversight and Investigations of the Committee on Commerce, House of Representatives, One Hundred Sixth Congress, second session, June 13, 2000
- Computer security : are we prepared for cyberwar? : hearing before ... 106th Congress, 2nd session, March 9, 2000
- Computer security in the federal government : hearing before the Subcommittee on Science, Technology, and Space of the Committee on Commerce, Science and Transportation, United States Senate, One Hundred Fifth Congress, second session, February 10, 1998
- Computer security in the federal government : how do the agencies rate? : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, first session, November 9, 2001
- Critical Infrastructure Protection : Multiple Efforts To Secure Control Systems Are Under Way, but Challenges Remain
- Critical Infrastructure Protection : Sector-Specific Plans' Coverage of Key Cyber Security Elements Varies
- Cyber Analysis and Warning : DHS Faces Challenges in Establishing a Comprehensive National Capability
- Cyber Security Enhancement Act of 2001 : hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, One Hundred Seventh Congress, second session on H.R. 3482, February 12, 2002
- Cyber attack : is the nation at risk? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, June 24, 1998
- Cyber attacks : the national protection plan and its privacy implications : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, One Hundred Sixth Congress, second session, on examining the vulnerability of U.S. systems to cyber attack, focusing on the administration's national plan for information systems protection and its implications regarding privacy, February 1, 2000
- Cyber security : U.S. vulnerability and preparedness : hearing before the Committee on Science, House of Representatives, One Hundred Ninth Congress, first session, September 15, 2005
- Cyber security--how can we protect American computer networks from attack? : hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, first session, October 10, 2001
- Cyber terrorism and information warfare
- Cyber terrorism--a view from the Gilmore Commission : hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, first session, October 17, 2001
- Cybercrime : Public and Private Entities Face Challenges in Addressing Cyber Threats
- Cybercrime against businesses, 2005
- Cybersecurity : next steps to protect our critical infrastructure : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Eleventh Congress, second session, February 23, 2010
- DOD Business Systems Modernization : Important Management Controls Being Implemented on Major Navy Program, but Improvements Needed in Key Areas
- DOD Business Systems Modernization : Planned Investment in Navy Program To Create Cashless Shipboard Environment Needs To Be Justified and Better Managed
- Data Mining : Early Attention to Privacy in Developing a Key DHS Program Could Reduce Risks
- Database nation : the death of privacy in the 21st century
- Defense Infrastructure : Full Costs and Security Implications of Cheyenne Mountain Realignment Have Not Been Determined
- Encryption : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fifth Congress, first session, March 19, 1997
- Federal Reserve Banks : Areas for Improvement in Information Security Controls
- Fighting fraud : improving information security : joint hearing before the Subcommittee on Financial Institutions and Consumer Credit and the Subcommittee on Oversight and Investigations of the Committee on Financial Services, U.S. House of Representatives, One Hundred Eighth Congress, first session, April 3, 2003
- Health Information Technology : HHS Has Taken Important Steps To Address Privacy Principles and Challenges, Although More Work Remains
- Hearing on the repeated failures of VA's information technology management : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 14, 2006
- Homeland security : the federal and New York response : hearing before the Committee on Science, House of Representatives, One Hundred Seventh Congress, second session, June 24, 2002
- How secure is our critical infrastructure? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Seventh Congress, first session, September 12, 2001
- How your computer can get you in trouble
- Implementation of the USA Patriot Act : crime, terrorism and the age of technology : hearing before the Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, House of Representatives, One Hundred Ninth Congress, first session, April 21, 2005
- Implications of power blackouts for the nation's cybersecurity and critical infrastructure protection : joint hearing of the Subcommittee on Cybersecurity, Science, and Research and Development and the Subcommittee on Infrastructure and Border Security of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, September 4, 2003 and September 23, 2003
- Inadvertent file sharing over peer-to-peer networks : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Tenth Congress, first session, July 24, 2007
- Industry speaks on cybersecurity : hearing of [sic] the Subcommittee on Cybersecurity, Science, and Research and Development before [sic] the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, July 15, 2003
- Information Assurance : National Partnership Offers Benefits, but Faces Considerable Challenges
- Information Security : Actions Needed To Better Protect Los Alamos National Laboratory's Unclassified Computer Network
- Information Security : Agencies Need To Develop and Implement Adequate Policies for Periodic Testing
- Information Security : Continued Progress Needed To Strengthen Controls at the Internal Revenue Service
- Information Security : Coordination of Federal Cyber Security Research and Development
- Information Security : Department of Health and Human Services Needs To Fully Implement Its Program
- Information Security : Despite Reported Progress, Federal Agencies Need To Address Persistent Weaknesses
- Information Security : FBI Needs To Address Weaknesses in Critical Network
- Information Security : FDIC Sustains Progress but Needs To Improve Configuration Management of Key Financial Systems
- Information Security : Federal Agency Efforts To Encrypt Sensitive Information Are Under Way, but Work Remains
- Information Security : Federal Deposit Insurance Corporation Needs To Improve Its Program
- Information Security : Federal Deposit Insurance Corporation Needs To Sustain Progress Improving Its Program
- Information Security : Further Efforts Needed To Address Significant Weaknesses at the Internal Revenue Service
- Information Security : IRS Needs To Address Pervasive Weaknesses
- Information Security : Improving Oversight of Access to Federal Systems and Data by Contractors Can Reduce Risk
- Information Security : Protecting Personally Identifiable Information
- Information Security : Securities and Exchange Commission Needs To Address Weak Controls over Financial and Sensitive Data
- Information Security : Securities and Exchange Commission Needs To Continue To Improve Its Program
- Information Security : Securities and Exchange Commission Needs To Continue To Improve Its Program
- Information Security : Selected Departments Need To Address Challenges in Implementing Statutory Requirements
- Information Security : Sustained Management Commitment and Oversight Are Vital to Resolving Long-Standing Weaknesses at the Department of Veterans Affairs
- Information Security : Sustained Progress Needed To Strengthen Controls at the Securities and Exchange Commission
- Information Security : TVA Needs To Address Weaknesses in Control Systems and Networks
- Information security : serious weaknesses place critical federal operations and assets at risk : report to the Committee on Governmental Affairs, U.S. Senate
- Information systems : VA computer control weaknesses increase risk of fraud, misuse, and improper disclosure : report to the Secretary of Veterans Affairs
- Internet Protocol Version 6 : Federal Government in Early Stages of Transition and Key Challenges Remain
- Internet security : hearing before the Subcommittee on Communications of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, second session, March 8, 2000
- Issues Associated with the Global Information Grid Bandwidth Expansion
- Lessons learned from the Government Information Security Reform Act of 2000 : hearing before the Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations of the Committee on Government Reform, House of Representatives, One Hundred Seventh Congress, second session, March 6, 2002
- Locking your cyber front door : the challenges facing home users and small businesses : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, June 16, 2004
- Managing Sensitive Information : Departments of Energy and Defense Policies and Oversight Could Be Improved
- Managing the challenges of the information age : issue area plan : fiscal years 1998-2000
- Millennium Digital Commerce Act, S. 761 : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Sixth Congress, first session, May 27, 1999
- National information policy : report to the President of the United States
- Overexposed : the threats to privacy and security on filesharing networks : hearing before the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, May 15, 2003
- Oversight of the State Department : technology modernization and computer security : hearing before the Committee on International Relations, House of Representatives, One Hundred Sixth Congress, second session, June 22, 2000
- Overview of the cyber problem : a nation dependent and dealing with risk : hearing before the Subcommittee on Cybersecurity, Science, and Research and Development before the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, June 22, 2003
- Personal information : data breaches are frequent, but evidence of resulting identity theft is limited, however, the full extent is unknown : report to congressional requesters
- Privacy : Lessons Learned About Data Breach Notification
- Protecting America's critical infrastructure : how secure are government computer systems? : hearing before the Subcommittee on Oversight and Investigations of the Committee on Energy and Commerce, House of Representatives, One Hundred Seventh Congress, first session, April 5, 2001
- Protecting our nation's cyber space : educational awareness for the cyber citizen : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, April 21, 2004
- Securing consumers' data : options following security breaches : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Ninth Congress, first session, May 11, 2005
- Security in the Information Age : New Challenges, New Strategies
- Social Security Numbers Are Widely Available in Bulk and Online Records, but Changes To Enhance Security Are Occurring
- Staff Report : Agency Data Breaches Since Jan. 1, 2003
- State and local government series : information security
- Stop, think, click : 7 practices for safer computing
- Telecommunications and SCADA : secure links or open portals to the security of our nation's critical infrastructure? : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, March 30, 2004
- The Melissa virus : inoculating our information technology from emerging threats : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Sixth Congress, first session, April 15, 1999
- The Melissa virus : inoculating our information technology from emerging threats : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Sixth Congress, first session, April 15, 1999
- The current state of DHS's efforts to secure federal networks : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, first session, March 28, 2017
- The electronic privacy papers : documents on the battle for privacy in the age of surveillance
- The encryption tightrope : balancing Americans' security and privacy : hearing before the Committee on the Judiciary, House of Representatives, One Hundred Fourteenth Congress, second session, March 1, 2016
- The invisible battleground : hearing before the Subcommittee on Cybersecurity, Science, and Research and Development of the Select Committee on Homeland Security, House of Representatives, One Hundred Eighth Congress, first session, September 16, 2003
- The role of computer security in protecting U.S. infrastructures : hearing before the Committee on Science, Subcommittee on Technology, U.S. House of Representatives, One Hundred Fifth Congress, first session, November 6, 1997
- The state of online consumer privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, first session, March 16, 2011
- The unwanted gaze : the destruction of privacy in America
- Update on the breach of data security at the Department of Veterans Affairs : hearing before the Committee on Veterans' Affairs, House of Representatives, One Hundred Ninth Congress, second session, June 29, 2006
- Veterans Affairs : Continued Action Needed To Reduce IT Equipment Losses and Correct Control Weaknesses
- Weak computer security in government : is the public at risk? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, May 19, 1998
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/5Gi2GsWHcBg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/5Gi2GsWHcBg/">Computer security -- United States</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security -- United States
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/5Gi2GsWHcBg/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/5Gi2GsWHcBg/">Computer security -- United States</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>